Articles about Security

How cyber security professionals see insider threats

Insider threat

Whilst the popular view of hackers tends to be of outsiders, there's been increasing emphasis in recent years on the threat to enterprise data posed by those inside the organization.

Behavior analytics company RedOwl carried out a survey at last month's Black Hat conference, asking almost 300 security professionals for their views on insider threats, and the results are released today.

Continue reading

Ping Identity partners with Microsoft to deliver secure application access

login password identity

Many large enterprises use Azure Active Directory (Azure AD) as their identity platform for managing users and providing secure access to thousands of cloud SaaS and on-premises applications.

Secure access company Ping Identity is announcing a collaboration with Microsoft to deliver integrations that will expand secure remote access and single sign-on (SSO) from any device to more on-premises web applications for Microsoft Azure AD customers.

Continue reading

GCHQ plans Great British Firewall to protect web users

Union flag keyboard

The UK's cyber intelligence agency GCHQ is planning what has been labelled a 'Great British Firewall' to protect individuals and companies against cyber attacks.

The idea emerged in a speech delivered by the head of GCHQ's national cybersecurity centre, Ciaran Martin, at the Billington Cyber Security Summit in Washington DC.

Continue reading

American Express customers phished using phishing prevention scam

credit_card_phishing

In a rather ironic twist on traditional phishing attacks, customers of American Express are being targeted by a campaign promising them an identity theft and phishing prevention tool.

The phishing emails offer SafeKey use as bait. This is a legitimate program that Amex offers its customers as an additional layer of security to guard against ID theft and phishing.

Continue reading

One in five companies fail to test for security vulnerabilities

Software analyst testing

Many businesses don't carry out frequent security testing despite believing that it's critically important to securing their systems and data, according to a new survey.

The study from managed security services company Trustwave and Osterman Research finds that one in five businesses surveyed don't do any security testing, despite the fact that 95 percent of respondents reported encountering common security issues associated with security vulnerabilities.

Continue reading

New partnership aims to improve threat detection

Hidden threat

The problem with many security solutions is that the number of alerts they generate leads to a good deal of time in investigations, some of which will turn out to be false positives.

Real-time analytics company Corvil is partnering with endpoint security specialist Carbon Black to offer customers unified cyber threat detection, analysis, and response.

Continue reading

Employees sue Seagate over HR department's private data leak

seagate2015_2c_horizontal_pos

After falling victim to a phishing scam in March, Seagate is now being sued by its own employees whose sensitive data was exposed in the leak.

The company's HR department was tricked into providing the operators of the phishing scheme with the personally identifiable information (PII) of 10,000 past and current employees and W-2 forms that include their Social Security numbers along with their wage, salary and tax information.

Continue reading

Dispelling 5 common myths about desktop printers in the office

Office printer woman

They may seem like technology from the days of old, but make no mistake -- desktop printers still can hold an important place in British businesses today. Not only do they help create efficient and flexible printing management, but they also can help keep British office workers at their most productive, rendering them potentially one of the most important products for IT managers in 2016.

The value of desktop printers is often overlooked due to advancements of new printer technology services, including an array of enterprise-orientated features, however, the traditional role of the printer mustn’t be forgotten. Desktop printers intertwined within a multi-device print and document management strategy, whilst also combining bigger multi-function devices with smaller devices, should arguably become commonplace for all managers responsible for their company’s printing activities.

Continue reading

The growing security risks in enterprise Windows environments [Q&A]

why question mark

ManageEngine recently announced the results of its global Active Directory and Windows Server Security -- Trends and Practices Survey for 2016, which found that 70 percent of IT administrators across the globe agree that their Windows environments are not immune to malicious attacks.

To delve a bit deeper, we spoke to Derek Melber, a technical evangelist for ManageEngine.

Continue reading

Fifteen years after 9-11, threats have evolved too

911-1

Fifteen years after 9-11 it’s interesting to reflect on how much our lives have -- and haven’t -- changed as a result of that attack. One very obvious change for all of us since 9-11 is how much more connected we are to the world and to each other than we were back then. Politico has a great post quoting many of the people flying on Air Force One that day with President George W. Bush as his administration reacted to the unfolding events. Reading the story one thing that struck me was the lack of immediate information about the attacks available to the airborne White House. They had televisions with rabbit ear antennas and rarely more than a few minutes of TV coverage to watch at a time as they blasted around the midwest at mach 0.94.

Even Mary Alyce and I, sitting on our Wine Country hillside, were watching satellite TV that day. Today, of course, we all have news and social media coming-in through a wide variety of channels and nothing is very private for long.

Continue reading

New version of RAA ransomware only goes after business users

Ransomware

A new version of the RAA ransomware was found recently by security researchers at Kaspersky Lab. This one, written completely in Jscript, seems to be targeting business users exclusively, the researchers claim.

It comes as they all do: through an email with the malicious attachment. This one, however, comes in a password-protected zip file. This method does two things:

Continue reading

Intel Security will revert to the McAfee name

Intel Security McAfee

Intel has made the decision to sell off a majority stake in its security software arm, which was previously known as McAfee, to the private equity firm TPG.

In 2010, the chip maker acquired the security software company for $7.6 billion and then four years later it decided to do away with the McAfee name entirely in favor of Intel Security. TPG, which will own 51 percent of the company after the sale, will be reverting the company name back to McAfee, likely due to the security software being a household name and having a large user base.

Continue reading

Niche software vulnerabilities leave enterprises open to attack

Security attack

News of software vulnerabilities often centers on products from well-known companies that potentially put large numbers of end users at risk.

But a new report from software solutions company Flexera Software reveals that the niche products used by specialist industries can be just as much of a problem.

Continue reading

Protecting your wireless security camera footage

BetaNews_Image1

About four years ago, before I had children, I was quite surprised when friends of mine had a baby monitor with a video display -- not because I didn't think something like that was possible, but the fact that it was normal and available in a nice wireless package was striking for someone inexperienced in the baby world.

Several years later, my wife now checks on our younger child every night with one. The sense of security and convenience that come with a device to instantly check on someone or something that you care about can be extremely valuable.

Continue reading

Chrome to warn users of insecure HTTP sites that transmit passwords or credit card info

http-typewriter

With Chrome, Google is on a mission. A mission to make the internet a safer place. Its ultimate goal is to display a warning that HTTP sites (rather than HTTPS) are insecure, but this is a long-term plan and there are many stages to go.

Starting at the beginning of next year in Chrome 56, the plan moves to its next stage. As of January 2017, any HTTP sites that transmit passwords or credit card details will be flagged up as being insecure.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.